From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pf1-f202.google.com (mail-pf1-f202.google.com [209.85.210.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 709EC348453 for ; Tue, 5 May 2026 01:41:55 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.202 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777945316; cv=none; b=HRhkwXZJT9SFwZUltkTtVwIIfOpNyhpNiqNFIsOVmHj6q2Z5xPMGtAfHNWQDu9T/2ZRUTAWAaLfndIpUpfDccuaagsWG1wCKtnD9MepcIaJwNLdzRW+7OaNvpX9vnPAINyPXwbE4F0xh4rwbS85wkxQPOaIxzsZUUFoAmhq6LOU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777945316; c=relaxed/simple; bh=8ymeVEIRfQfXU1NB8HZHrfH6ISjD+L8gEflEZ4uHTVs=; h=Date:Mime-Version:Message-ID:Subject:From:To:Cc:Content-Type; b=YYjo/FfF5Cp7JSRtFZYCgJCByLmI5ddGuDh4ao1gRAvbztTgqSQgoDALKldiTZFgcbmS/yqXgzPquO8bE1sX4wTyeDMMBrTqs3c4GkpxnTXow5slmgD9F3VJ9QnOg1D/Qs3wKP2W3FV65HOf5J2dowP/JJgfqXzoWIcX1owYmoo= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--vannapurve.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=oqy+pOes; arc=none smtp.client-ip=209.85.210.202 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--vannapurve.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="oqy+pOes" Received: by mail-pf1-f202.google.com with SMTP id d2e1a72fcca58-82f6e6a3a76so4886291b3a.0 for ; Mon, 04 May 2026 18:41:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20251104; t=1777945314; x=1778550114; darn=vger.kernel.org; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=09pZCJKdOJo9j2iY5tzzUKd0+hE83Q2DSvUvCNdXB8o=; b=oqy+pOesUdU8DNrWiiFZ4hZsFmpaUUf6KycoH4QXhtK9eO/KSGFVgrxKJLx0pl/qpi VjVh1zhOJK9XlqO4c2y6LMB6YtKFD22kpIYSwAKkz8F70Vc0XrlyD6K4EyNJIMwIN8do wmHADVNj5XlDfZD27I3cPd/eep9A9fRvbyWUoGsIXrWMGxN1LkYlyIv9H21rgWzI0NjD k0RJlZwnPhdrTcND4WjmtpdnixRz3YHwvMiYqCwpG/z7EHSyju9poI59WpBUzbYdWQEX Y7m+IJ06shYz9W/UqSIYUJr1IqmIJKE8Yz2+xvXwVdtNJEqNTUjiWzgWTuE3F4l/ctsq 4c1g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777945314; x=1778550114; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=09pZCJKdOJo9j2iY5tzzUKd0+hE83Q2DSvUvCNdXB8o=; b=ka3kAMPCbjof6ysIcrMPlc71ExQr/pXeNCP8qrJEbrDcuXRa+IxuQMmnGuO2s0iZXe 3hJlU88ZpjS8o5bCxIqlP9A/HWq2fjmlGcprhaeV2Ogy2RKiQ2YLZi6fvfGx9WtFjl1P wRvQXzzG9FFFoCS7VC2Vpkkj21sVjblyHfOgbLh0jWymmEPhf0B6c/8KDDVRzTUkVsAZ w5jzP7RlqJA9o0sSYdq+i/MccX8UWE0qm+PeC5PYB/nxuGN2iSDrOfzngjrkKsI6NqZs Ziu7BtNlspIMmGOdLSNbGxA0gOkDjxPLP1NHB1LT55AoAbVLid6RwVN5HyjDVROb5pd5 uFPQ== X-Forwarded-Encrypted: i=1; AFNElJ8IyY2Hkv3E+Z0Uv5EJ4uDpE2G13VyjvAVPb/Sjj8b8kxX6fY+BNiur2ZjhYH8KnkAcPp3VY41vkjEDpEk=@vger.kernel.org X-Gm-Message-State: AOJu0YxXHgA1Z+ImE49QAUYp/aDgfs3euHTGhFtWCFy6pESnxEH3Rdi/ lf1jQPjzChc4j7KNwwUWQkv4+RdKAfs/hfDOPPSa1XEINIuj5I0C6/W0IcTXMn7gtJKGqda+yuk FTFltdrDOTf8GLpkHUbuq5g== X-Received: from pfbhw22.prod.google.com ([2002:a05:6a00:8916:b0:837:6551:488]) (user=vannapurve job=prod-delivery.src-stubby-dispatcher) by 2002:a05:6a00:4095:b0:837:acd7:a7d with SMTP id d2e1a72fcca58-83923e98589mr1094865b3a.28.1777945314017; Mon, 04 May 2026 18:41:54 -0700 (PDT) Date: Tue, 5 May 2026 01:41:16 +0000 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 X-Mailer: git-send-email 2.54.0.545.g6539524ca2-goog Message-ID: <20260505014118.3783476-1-vannapurve@google.com> Subject: [PATCH 0/2] KVM: TDX: Disable PMU virtualization for TDX VMs From: FirstName LastName To: seanjc@google.com, pbonzini@redhat.com, dave.hansen@linux.intel.com Cc: rick.p.edgecombe@intel.com, dapeng1.mi@linux.intel.com, mizhang@google.com, jmattson@google.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Vishal Annapurve Content-Type: text/plain; charset="UTF-8" From: Vishal Annapurve TDX module virtualizes PMU for TDX VMs [1]. KVM has limited role to play in virtualizing PMU accesses and needs additional enlightenment to support all toggles provided by TDX module. This series disables PMU virtualization within KVM for TDX VMs, which is a safe bet until the complete set of PMU controls are implemented within KVM. [1] Section 15.2: https://cdrdv2.intel.com/v1/dl/getContent/733575 Vishal Annapurve (2): KVM: x86: Move the default arch state init before vm_init() call KVM: TDX: Disable pmu virtualization for TDX VMs arch/x86/kvm/vmx/tdx.c | 6 ++++++ arch/x86/kvm/x86.c | 10 +++++----- 2 files changed, 11 insertions(+), 5 deletions(-) -- 2.54.0.545.g6539524ca2-goog